The Internet of Things (IoT) is known as the concept of connecting
everyday physical devices to the Internet. It is natural to assume that the
popularity and development within this field will increase in the following
years. ...

With the implementation of smarter electric power distribution grids follows
new technologies, which lead to increased connectivity and complexity.
Traditional IT components – hardware, firmware, software – replace ...

In this thesis we look into network performance bottlenecks and how end-to-end delivery of data is affected by the performance of the network.The last years, the buzzword: the bufferbloat issue has gotten much attention ...

Considering about the research of this thesis and the prototype system, it is clearly that the unified communication service with WebRTC is a promising concept in the telecommunication industry. The functions provided by ...

Web Real-Time Communication (WebRTC) is a technology enabling web browsers to connect directly to each other, and send information e.g. video or text messages peer-to-peer. This technology is currently being implemented ...

An identity is defined as "a set of attributes relating to an entity". One entity is distinguishable from another entity on the basis of its attributes within a context. "Black hair", "glasses" and "male" are attributes ...

Communication in remote locations, specially in high-latitude regions, such as the Arctic, is challenged by the lack of infrastructures and by the limited availability of resources. However, these regions have high scientific ...

Today, malware is often found on legitimate web sites that have been hacked. The aim of this thesis was to create a system to crawl potential malicious web sites and rate them as malicious or not. Through research into ...

This thesis will estimate use of authentication mechanism and biometric systems
used in Norwegian industry. We will investigate how different factors influence the
usage and application of authentication/identification ...

ENGELSK: Solving systems of multivariate polynomial equations is hard, even NP-hard in the general case.
The method of Göbner bases can be used to solve such systems, and thus has a running time complexity
at least that ...

In today’s intrusion detection systems (IDSs), a trade-off between efficiency and accuracy must
be achieved. Because of that, the decision on structures for representing patterns of normal and
intrusive behavior are of ...

The security reports are unambiguous: the human factor constitutes a real vulnerability in the information security domain. It is crucial that employees of companies and governments understand the risks and threats connected ...

IMS-WLAN interworking is a step towards extending IMS functionality into other access technologies, but this architecture is very comprehensive and is unlikely to be employed everywhere. The result is a need for alternative ...

Among all the new applications and services coming, are technological tools one can benefit from, in fields such as educational environments. The increased use of technology in schools has opened up for new ways of learning, ...

The use of digital services has become part of peoples' everyday lives. Research on how people use and engage with these services has become increasingly important. User engagement is a concept that has gained prominence ...

This project focuses on the creation of an Android app for location based push commercials, which henceforth will be called an offers app. The idea of the app is the following: Users are allowed to chose which ac- tors ...